• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wen Kun, Yang Jiahai, Cheng Fengjuan, Yin Hui, Wang Jianfeng. MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822. DOI: 10.7544/issn1000-1239.2015.20148347
Citation: Wen Kun, Yang Jiahai, Cheng Fengjuan, Yin Hui, Wang Jianfeng. MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822. DOI: 10.7544/issn1000-1239.2015.20148347

MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network

More Information
  • Published Date: March 31, 2015
  • Reduction of quality (RoQ) attack is an atypical denial of service (DoS) attack, which exploits the vulnerability of TCP’s adaptive behavior that can seriously reduce or inhibit the throughput of TCP flows. While most of the defensive methods are studied on the single network access link (router), the RoQ attack can not only launch on the single network link, but also attack towards several links or even entire network, which causes more severe consequences. In order to obtain a global perspective from the network and identify the attack, in this paper we propose a traffic anomaly analysis method to monitor, identify and locate the RoQ attack in backbone network on the basis of principal component analysis (PCA) and spectrum analysis techniques. Experimental results demonstrate that our method can analyze and find anomalies in the traffic from several downstream links in backbone network, and also locate and identify the RoQ attacks accurately. Meanwhile, our method can significantly reduce the computation and complexity as it only needs to analyze local traffic data about anomalous links.
  • Related Articles

    [1]Liu Wenjie, Wang Bosi, Chen Junxiu. A Quantum Principal Component Analysis Algorithm for Clustering Problems[J]. Journal of Computer Research and Development, 2022, 59(12): 2858-2866. DOI: 10.7544/issn1000-1239.20210333
    [2]Liang Dachuan, Li Jing, Liu Sai, Li Dongmin. Multiple Object Saliency Detection Based on Graph and Sparse Principal Component Analysis[J]. Journal of Computer Research and Development, 2018, 55(5): 1078-1089. DOI: 10.7544/issn1000-1239.2018.20160681
    [3]Fang Minquan, Zhang Weimin, Zhou Haifang. Parallel Algorithm of Fast Independent Component Analysis for Dimensionality Reduction on Many Integrated Core[J]. Journal of Computer Research and Development, 2016, 53(5): 1136-1146. DOI: 10.7544/issn1000-1239.2016.20148080
    [4]LiFeng, PanJingkui. Human Motion Recognition Based on Triaxial Accelerometer[J]. Journal of Computer Research and Development, 2016, 53(3): 621-631. DOI: 10.7544/issn1000-1239.2016.20148159
    [5]Ju Xiaolin, Jiang Shujuan, Chen Xiang, Zhang Yanmei, Shao Haoran. Factor Analysis of Influence for Fault Localization Framework Based on Slice Spectrum[J]. Journal of Computer Research and Development, 2014, 51(12): 2772-2787. DOI: 10.7544/issn1000-1239.2014.20131522
    [6]Wang Yiding, Jiang Nan, Li Kefeng. Dynamic Spatial Synthesis of Dorsal Hand Vein Images Based on PCA[J]. Journal of Computer Research and Development, 2014, 51(10): 2302-2307. DOI: 10.7544/issn1000-1239.2014.20130822
    [7]Wang Zhiming, Tao Jianhua. Face Occlusion Detection and Reconstruction[J]. Journal of Computer Research and Development, 2010, 47(1): 16-22.
    [8]Li Shengmei, Cheng buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong. Principal Component Linear Regression Analysis on Performance of Applications[J]. Journal of Computer Research and Development, 2009, 46(11): 1949-1955.
    [9]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.
    [10]Gu Yu, Xu Zongben, Sun Jian, Zheng Jinhui. An Intrusion Detection Ensemble System Based on the Features Extracted by PCA and ICA[J]. Journal of Computer Research and Development, 2006, 43(4): 633-638.
  • Cited by

    Periodical cited type(2)

    1. 武永强,刘正刚. 基于决策树的工业通信网全链路数据异常检测方法. 电子设计工程. 2024(09): 138-141+146 .
    2. 樊娜,李思瑞,邹小敏,高艺丰. 面向VNDN的兴趣包洪泛攻击检测. 计算机系统应用. 2022(12): 41-50 .

    Other cited types(6)

Catalog

    Article views (1387) PDF downloads (769) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return